Verifiable Random Functions from Non-interactive Witness-Indistinguishable Proofs

被引:13
|
作者
Bitansky, Nir [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
基金
以色列科学基金会; 美国国家科学基金会;
关键词
Foundations; Verifiable random functions; Non-interactive witness indistinguishable proofs; CONSTRUCTION; ENCRYPTION;
D O I
10.1007/s00145-019-09331-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Verifiable random functions (VRFs) are pseudorandom functions where the owner of the seed, in addition to computing the function's value y at any point x, can also generate a non-interactive proof pi that y is correct, without compromising pseudorandomness at other points. Being a natural primitive with a wide range of applications, considerable efforts have been directed toward the construction of such VRFs. While these efforts have resulted in a variety of algebraic constructions (from bilinear maps or the RSA problem), the relation between VRFs and other general primitives is still not well understood. We present new constructions of VRFs from general primitives, the main one being non-interactive witness-indistinguishable proofs (NIWIs). This includes: (1) a selectively secure VRF assuming NIWIs and non-interactive commitments. As usual, the VRF can be made adaptively secure assuming subexponential hardness of the underlying primitives. (2) An adaptively secure VRF assuming (polynomially hard) NIWIs, non-interactive commitments, and (single-key) constrained pseudorandom functions for a restricted class of constraints. The above primitives can be instantiated under various standard assumptions, which yields corresponding VRF instantiations, under different assumptions than were known so far. One notable example is a non-uniform construction of VRFs from subexponentially hard trapdoor permutations, or more generally, from verifiable pseudorandom generators (the construction can be made uniform under a standard derandomization assumption). This partially answers an open question by Dwork and Naor (FOCS '00). The construction and its analysis are quite simple. Both draw from ideas commonly used in the context of indistinguishability obfuscation.
引用
收藏
页码:459 / 493
页数:35
相关论文
共 50 条
  • [21] ZAPs and Non-Interactive Witness Indistinguishability from Indistinguishability Obfuscation
    Bitansky, Nir
    Paneth, Omer
    THEORY OF CRYPTOGRAPHY (TCC 2015), PT II, 2015, 9015 : 401 - 427
  • [22] Succinct Non-Interactive Arguments via Linear Interactive Proofs
    Nir Bitansky
    Alessandro Chiesa
    Yuval Ishai
    Rafail Ostrovsky
    Omer Paneth
    Journal of Cryptology, 2022, 35
  • [23] Succinct Non-interactive Arguments via Linear Interactive Proofs
    Bitansky, Nir
    Chiesa, Alessandro
    Ishai, Yuval
    Paneth, Omer
    Ostrovsky, Rafail
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 315 - 333
  • [24] A novel non-interactive verifiable secret sharing scheme
    Ao, Jun
    Liao, Guisheng
    Ma, Chunbo
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 1525 - +
  • [25] On non-interactive zero-knowledge proofs of knowledge in the shared random string model
    Persiano, Giuseppe
    Visconti, Ivan
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2006, PROCEEDINGS, 2006, 4162 : 753 - 764
  • [26] Multi-Client Non-interactive Verifiable Computation
    Choi, Seung Geol
    Katz, Jonathan
    Kumaresan, Ranjit
    Cid, Carlos
    THEORY OF CRYPTOGRAPHY (TCC 2013), 2013, 7785 : 499 - 518
  • [27] Non-interactive publicly verifiable electronic voting scheme
    Information Engineering Institute, Information Engineering University, Zhengzhou 450002, China
    Kongzhi yu Juece Control Decis, 2006, 1 (107-110):
  • [28] A non-interactive modular verifiable secret sharing scheme
    Li, Q
    Wang, ZF
    Niu, XM
    Sun, SH
    2005 INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS, VOLS 1 AND 2, PROCEEDINGS: VOL 1: COMMUNICATION THEORY AND SYSTEMS, 2005, : 84 - 87
  • [29] Non-interactive designated verifier proofs and undeniable signatures
    Kudla, C
    Paterson, KG
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 136 - 154
  • [30] Short Non-interactive Zero-Knowledge Proofs
    Groth, Jens
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 341 - 358